General
-
Target
Purchase Order.exe
-
Size
533KB
-
Sample
240404-mz9gwsde66
-
MD5
7eb1409fed2a2b740122f997a76f7a94
-
SHA1
8cc9e2d414bc1c8964b965989fb6648857ae9892
-
SHA256
ff2ae4fd71daa1a98edd5f88b743a5daa5fb29f70b87dee08fec25313a3640f1
-
SHA512
e1df8be427c813ded706628025f38454520a24990b8be54893132b9a44f6874cef1b54f51fa3dd4f56c9622df73ab71fc14ded126c262eea3f3d515039c238a0
-
SSDEEP
12288:/WUHaP7P5nea9GotNgJ9/KYEQDSAj/aK5zYFQCmO5lT05G:/lHgj5nbGotNCVDSAWKcQCxQ
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Purchase Order.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
EbxKZL@2
Extracted
snakekeylogger
https://scratchdreams.tk
Targets
-
-
Target
Purchase Order.exe
-
Size
533KB
-
MD5
7eb1409fed2a2b740122f997a76f7a94
-
SHA1
8cc9e2d414bc1c8964b965989fb6648857ae9892
-
SHA256
ff2ae4fd71daa1a98edd5f88b743a5daa5fb29f70b87dee08fec25313a3640f1
-
SHA512
e1df8be427c813ded706628025f38454520a24990b8be54893132b9a44f6874cef1b54f51fa3dd4f56c9622df73ab71fc14ded126c262eea3f3d515039c238a0
-
SSDEEP
12288:/WUHaP7P5nea9GotNgJ9/KYEQDSAj/aK5zYFQCmO5lT05G:/lHgj5nbGotNCVDSAWKcQCxQ
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-